background preloader

La Quadrature du Net

La Quadrature du Net

Getting the Message? Police Track Phones with Silent SMS In June 2011, Colette Giudicelli, a senator representing the Maritime Alps region of France, wrote to Claude Gueant, the French Interior Minister: Many foreign police and intelligence services use clandestine “Silent” SMS to locate suspects or missing persons. This method involves sending an SMS text message to the mobile phone of a suspect, an SMS that goes unnoticed and sends back a signal to the sender of the message. Colette Giudicelli would like to know whether this procedure has been used in France. Seven months later, and there has still been no response from the French government. Also known as Flash-SMS, the Silent SMS uses an invisible return signal, or “ping”. The Silent SMS allows the user to send a message to another mobile without the knowledge of the recipient mobile’s owner. Silent SMS were originally intended to allow operators to ascertain whether a mobile phone is switched on and to “test” the network, without alerting the users. Smile, you’re being tracked

Ninja Cloak | Fast, free, anonymous web browsing with NinjaCloak.com Mobile Surveillance - A Primer Share This Mobiles can be useful tools for collecting, planning, coordinating and recording activities of NGO staff and activists. But did you know that whenever your phone is on, your location is known to the network operator? Or that each phone and SIM card transmits a unique identifying code, which, unless you are very careful about how you acquire the phone and SIM, can be traced uniquely to you? With cameras, GPS, mobile Internet come ever more dangerous surveillance possibilities, allowing an observer, once they have succeeded in gaining control of the phone, to turn it into a sophisticated recording device. This is understandably disquieting to activists involved in sensitive work. Obviously, the most secure way to use a phone is not to use one at all. For every phone currently on the network (receiving a signal, regardless of whether the phone has been used to call or send messages) the network operator has the following information: SMS you have sent or received Data Sheet Author:

rosagit This Internet provider pledges to put your privacy first. Always. | Privacy Inc. Nicholas Merrill is planning to revolutionize online privacy with a concept as simple as it is ingenious: a telecommunications provider designed from its inception to shield its customers from surveillance. Merrill, 39, who previously ran a New York-based Internet provider, told CNET that he's raising funds to launch a national "non-profit telecommunications provider dedicated to privacy, using ubiquitous encryption" that will sell mobile phone service and, for as little as $20 a month, Internet connectivity. The ISP would not merely employ every technological means at its disposal, including encryption and limited logging, to protect its customers. It would also -- and in practice this is likely more important -- challenge government surveillance demands of dubious legality or constitutionality. A decade of revelations has underlined the intimate relationship between many telecommunications companies and Washington officialdom. Like the eavesdropping system that President George W.

Роберт Руарк. Старик и мальчик | Журнал Памяти моих дедов, моего отца и всех моих названных дядей, черных и белых, которые вырастили меня, посвящаю я эту книгу. С джентльменом нужно обращаться по-джентльменски Старик знает все или почти все на свете. Выглядит Старик, прямо скажем, непрезентабельно. Он вечно ходит в мятых штанах и плюется метко, как плевались люди в те времена, когда почти все взрослые мужчины жевали «яблочный табак». Что мне нравится в старике, так это то, что он охотно говорит о том, что знает, и никогда не смотрит сверху вниз на любознательного мальчишку. Вот, например, кликнули мы со Стариком как-то собак и отправились в рощу посмотреть, нет ли там перепелов. — Что-то мне не хочется стрелять, — сказал Старик. — Давай-ка лучше ты. Я обошел Пита, и птицы взлетели, как фейерверк в День независимости, и я поступил так, как поступают поначалу почти все: начал палить по всем птицам разом. Я посмотрел на Старика, он на меня, каким-то, я бы сказал, печальным взглядом. Старик улыбнулся и пососал трубку. О черт!

Cell Phone Location Tracking Public Records Request Of all of the recent technological developments that have expanded the surveillance capabilities of law enforcement agencies at the expense of individual privacy, perhaps the most powerful is cell phone location tracking. And now, after an unprecedented records request by ACLU affiliates around the country, we know that this method is widespread and often used without adequate regard for constitutional protections, judicial oversight, or accountability. All cell phones register their location with cell phone networks several times a minute, and this function cannot be turned off while the phone is getting a wireless signal. The threat to personal privacy presented by this technology is breathtaking. To know a person's location over time is to know a great deal about who a person is and what he or she values. The government should have to obtain a warrant based upon probable cause before tracking cell phones. In United States v. What we have learned is disturbing.

Главная - liberty.ru Mobile Carriers Lobby Against Cell Phone Location Privacy Bill | Threat Level Tracking a Sprint Nextel cellphone. Image: U.S. District Court -- Southern District of Ohio. Cellphone companies are objecting to proposed California legislation that would force them to publicly report the number of times they turn over cellphone location information to police and federal agents, arguing that it’s too burdensome, and would take time away from the important work of sharing customer data with cops “day and night.” At issue is California’s SB 1434, a bill that would prohibit carriers from turning over locational data to police without a warrant. The companies, including AT&T, Sprint, T-Mobile and Verizon, oppose a provision of the bill that would force them to keep track of law enforcement requests and to annually publish that information on the internet. Nicole Ozer, an ACLU staff attorney, scoffed at the industry’s claims that the reporting requirements in California’s proposal would be burdensome. Even if Leno’s measure reaches Gov. Homepage photo: pvera/Flickr

Anticopyright Senators strip reporting requirement from location privacy bill | Tech Chronicles Senator Mark Leno’s bill banning warrantless government searches of cell phone location information survived its first test at the California State Legislature, but it didn’t emerge unscathed. The ACLU of Northern California, a co-sponsor of the measure, told The Chronicle that the California Location Privacy Bill passed through the Public Safety Committee late Tuesday, meaning it’s headed for a full vote later this year. But Senators Curren Price Jr. Without that reporting requirement, there’s little way to monitor law enforcement’s compliance with the main aspects of the law, or for mobile customers to understand how their data is being used, Senator Leno said in an interview. “This is a good first step,” he said of the bill’s passage through committee. Nicole Ozer, technology and civil liberties policy director at the ACLU of Northern California, went further. Read more of the organization’s take here.

КСтолбу.Ru There is no such thing as anonymous online tracking A 1993 New Yorker cartoon famously proclaimed, "On the Internet, nobody knows you're a dog." The Web is a very different place today; you now leave countless footprints online. You log into websites. You share stuff on social networks. In the language of computer science, clickstreams — browsing histories that companies collect — are not anonymous at all; rather, they are pseudonymous. Will tracking companies actually take steps to identify or deanonymize users? Regardless, what I will show you is that if they’re not doing it, it’s not because there are any technical barriers. Here are five concrete ways in which your identity can be attached to data that was initially collected without identifying information. 1. Most of the companies with the biggest reach in terms of third-party tracking, such as Google and Facebook, are also companies that users have a first-party relationship with. 2. GET http:/​/ad.doubleclick.net/adj/... There are two important points to note. 3. 4. 5. Conclusion

Diletant: Я знаю, что я ничего не знаю

Related: